Top Stories

Reflection of hacker coding working hackathon at laptop

In God We Trust, All The Others We Monitor!

18-May-2020 | Thomas Frénéhard | Governance

Monitoring data, not just the perimeter, helps companies better protect the information held in their systems against insider threats.

Golden statue of a dragon in a Chinese temple

Emerging Risk: Hic Sunt Dracones

6-Apr-2020 | Thomas Frénéhard | Governance

Threats never appear without warning; the trick is to be ready for them before they turn into risks.

Baker Putting Dessert in Display Case

Agile Content Development For Software Adoption: Is Enablement Really A Piece Of Cake?

26-Mar-2020 | Sandra Policht | Governance

With the right ingredients and recipe, creating high-quality, relevant, and engaging content just-in-time is almost a piece of cake.

Latest Stories

An Outcome-Driven Enterprise Data Strategy: Data Lifecycle Processes
Learn More

AI In The Financial Sector: The Ethics Of Algorithms (Part 2)
Learn More

Who Owns What? Your Data Protection Responsibility In The Multi-Cloud World
Learn More

Launching A GRC Overhaul? Think Out Of The Box
Learn More

Supplier Risk Management In Financial Services: Overcoming The Dangers
Learn More

Intelligent GRC For The Intelligent Enterprise
Learn More

Integrating Business Continuity Management Within Your GRC Process
Learn More

Digital Transformation In Governance, Risk Management, And Compliance
Learn More

Load more stories
← Older posts
Newer posts →